咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Systems Science"
26095 条 记 录,以下是841-850 订阅
排序:
Querying Data Exchange Settings beyond Positive Queries  4
Querying Data Exchange Settings beyond Positive Queries
收藏 引用
4th International Workshop on the Resurgence of Datalog in Academia and Industry, Datalog-2.0 2022
作者: Calautti, Marco Greco, Sergio Molinaro, Cristian Trubitsyna, Irina Department of Information Engineering and Computer Science University of Trento Italy Department of Computer Science Modeling Electronics and Systems Engineering University of Calabria Italy
Data exchange, the problem of transferring data from a source schema to a target schema, has been studied for several years. The semantics of answering positive queries over the target schema has been defined in early... 详细信息
来源: 评论
AI-Driven Virtual Mock Interview Development  13
AI-Driven Virtual Mock Interview Development
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Mishra, Prabhat Kumar Arulappan, Arun Kumar Ra, In-Ho Thanga Mariappan, L. Gina Rose, G. Lee, Young-Seok School of Computer Science Engineering and Information Systems Vit University Vellore India School of Computer and Software Kunsan National University Gunsan Korea Republic of Anna University Department of Computer Technology Chennai India
The integration of Artificial Intelligence (AI) into educational technologies marks a significant shift in learning methodologies and operational dynamics within educational institutions. At the forefront is an AI-dri... 详细信息
来源: 评论
Anomaly-Based Detection of Log4j Attack in SDN
Anomaly-Based Detection of Log4j Attack in SDN
收藏 引用
International Conference on Smart systems and Wireless Communication, SSWC 2024
作者: Deshmukh, Pruthviraj Nitin Harish, R. Sangeetha, V. Praveen, K. TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani India
The widely used Java library Log4j logging framework has lately come under attack from a major vulnerability known as CVE-2021–44228, also known as Log4Shell. Through the use of malicious log messages, the vulnerabil... 详细信息
来源: 评论
Indirect Vector Control of Linear Induction Motors Using Space Vector Pulse Width Modulation
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6263-6287页
作者: Arjmand Khaliq Syed Abdul Rahman Kashif Fahad Ahmad Muhammad Anwar Qaisar Shaheen Rizwan Akhtar Muhammad Arif Shah Abdelzahir Abdelmaboud Electrical Engineering Department University of Engineering and TechnologyLahore54700Pakistan Department of Basic Sciences Deanship of Common First YearJouf UniversitySakakaAljouf72341Saudi Arabia Department of Information Science Division of Science and TechnologyUniversity of EducationLahore54000Pakistan Department of Computer Science and Information Technology The Islamia University of BahawalpurRahim Yar Khan Sub CampusPakistan Department of IT and Computer Science Pak-Austria Fachhochschule Institute of Applied Sciences and TechnologyHaripurPakistan Department of Information Systems King Khalid UniversityMuhayel Aseer61913Saudi Arabia
Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance *** trend promotes the development of precise and efficient control schemes for individual *** research aims to p... 详细信息
来源: 评论
Network Model to Generate Visual Realism images from Textual Data  2
Network Model to Generate Visual Realism images from Textual...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Vidyullatha, Pellakuri Unhelkar, Bhuvan Chakrabarti, Prasun Ghantasala, G.S. Pradeep Shaik, Amjan Pyla, Meghana Department of Information Systems and Decision Sciences Muma College of Business University of South Florida South Florida United States Department of CSE Koneru Lakshmaiah Educationn Foundation Vaddeswaram AP Guntur India Department of Computer Science and Engineering Sir Padampat Singhania University Rajasthan Udaipur India Department of Computer Science and Engineering Alliance College of Engineering and Design Alliance University Bengaluru India Department of Computer Science and Engineering St.Peters Engineering College TS Maisammaguda India
Generative Adversarial Networks (GANs) have the ability to produce realistic images from random noise vectors and has attracted a lot of attention in recent years. The textual input is discontinuous and requires effic... 详细信息
来源: 评论
A flexible capacitive photoreceptor for the biomimetic retina
收藏 引用
Light(science & Applications) 2022年 第1期11卷 38-49页
作者: Mani Teja Vijjapu Mohammed E.Fouda Agamyrat Agambayev Chun Hong Kang Chun-Ho Lin Boon S.Ooi Jr-Hau He Ahmed M.Eltawil Khaled N.Salama Sensors lab Advanced Membranes and Porous Materials CenterComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Communication and Computing Systems Lab ComputerElectrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Electrical Engineering and Computer Science University of California-IrvineIrvineCA 92612USA Department of Electrical Computer and Energy EngineeringArizona State UniversityTempeAZUSA Computer Electrical and Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia Department of Materials Science and Engineering City University of Hong KongHong Kong SARChina
Neuromorphic vision sensors have been extremely beneficial in developing energy-efficient intelligent systems for robotics and privacy-preserving security *** is a dire need for devices to mimic the retina's photo... 详细信息
来源: 评论
Less Labeling Burden: A SAR Ship Detection Data Selection Method Based on K-means  2
Less Labeling Burden: A SAR Ship Detection Data Selection Me...
收藏 引用
2nd IEEE International Conference on Signal, Information and Data Processing, ICSIDP 2024
作者: Yang, Yimin Yin, Junjun Lang, Ping Yang, Jian He, Yaomin Tsinghua University Department of Electronic Engineering Beijing China University of Science and Technology School of Computer and Communication Engineering Beijing China Academy of Military Sciences Institute of Systems Engineering Beijing China
In deep learning-based object detection, labeled data is crucial. However, annotating ship targets in Synthetic Aperture Radar (SAR) images is challenging because of the distinct characteristics of SAR images, especia... 详细信息
来源: 评论
Supremal and Robust Control against Actuator Jamming Attacks in Cyber-Physical systems
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2023年 第9期9卷 1-13页
作者: Duo, Wenli Wang, Shouguang Zhou, MengChu You, Dan Wisniewski, Remigiusz Bazydlo, Grzegorz Albeshri, Aiiad Institute of Systems Engineering Macau University of Science and Technology Macau China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA Institute of Control and Computation Engineering University of Zielona Góra Zielona Góra Poland Department of Computer Science King Abdulaziz University Jeddah Saudi Arabia
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c... 详细信息
来源: 评论
Research on Polarization Theory Based on Target Polarization Projection  2
Research on Polarization Theory Based on Target Polarization...
收藏 引用
2nd IEEE International Conference on Signal, Information and Data Processing, ICSIDP 2024
作者: He, Yaomin Yang, Jian Yang, Yimin Yin, Junjun Liu, Chao Academy of Military Sciences Institute of Systems Engineering Beijing China Tsinghua University Department of Electronic Engineering Beijing China University of Science and Technology School of Computer and Communication Engineering Beijing China
Aiming at the information processing in classical polarization theory, such as polarization decomposition, optimal polarization, polarization filtering, polarization detection, and polarization classification, et al, ... 详细信息
来源: 评论
Hybrid System with Modified Cuckoo Search to Design Airfoil
Hybrid System with Modified Cuckoo Search to Design Airfoil
收藏 引用
2023 International Conference on Data science, Agents and Artificial Intelligence, ICDSAAI 2023
作者: Thinakaran, K. Anand, M. Kumar, T.Rajesh Atham, Saira Banu Subramanian, K.M. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science India Srm Institute of Science and Technology School of Computing Department of Data Science and Business Systems Chennai Kattankulathur India Saveetha Institute of Medical and Technical Science Saveetha School of Engineering India Presidency University School of Cse & Is Department of Computer Science and Engineering Bangaluru India Shadan College of Engineering and Technology Department of Computer Science Engineering Hyderabad India
The proposed models can design the airfoil by Cuckoo search with Levenberg-Marquardt. The Neural Network framework has impediments due to over-fitting. This paper proposed a modified cuckoo search. here the aerodynami... 详细信息
来源: 评论